Главная
Study mode:
on
1
Introduction
2
Who am I
3
All bugs are shallow
4
Structure
5
binaries
6
NSA backdoors
7
War Games
8
What makes a backdoor good
9
Historical backdoors
10
The creator was like
11
How the whole thing worked
12
The missing quality
13
The Linux kernel backdoor
14
The Linux bitkeeper backdoor
15
Commit discrepancies
16
The backdoor
17
Removing one character
18
A better backdoor
19
Bad programming
20
Backdoor
21
C99
22
R57
23
Backdoors
24
Source code
25
Versions
26
Extract Issue
27
WDB Backup
28
The Real Issue
29
The Code
30
The Bad
31
Perfect backdoor
32
Database password
33
Why would you do that
34
Linux kernel backdoor
35
Other good backdoors
36
Questions
Description:
Explore the intricacies of backdoors in software systems through this 33-minute conference talk from GrrCON 2014. Delve into the world of vulnerabilities by design, examining historical backdoors and their creators. Learn about the characteristics of effective backdoors, including examples from the Linux kernel and other notable cases. Analyze the techniques used to implement and conceal backdoors, from simple character removals to more sophisticated methods. Gain insights into the motivations behind intentional vulnerabilities and their potential consequences. Discover how seemingly innocuous coding practices can lead to significant security risks. Enhance your understanding of software security and the importance of thorough code review to identify and prevent backdoors.

Vulnerable by Design - The Backdoor That Came Through the Front

Add to list
0:00 / 0:00